Analysis

  • max time kernel
    0s
  • max time network
    3s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    22/10/2023, 16:47

General

  • Target

    NEAS.105f0e78b1b9a26d9247b107bc07c060.exe

  • Size

    78KB

  • MD5

    105f0e78b1b9a26d9247b107bc07c060

  • SHA1

    fcd640c590deab73e88222c3466163cbea8aa91e

  • SHA256

    dc149e71903163cd0b45fc723576d30ef930b98fda18d3e855d389cfc673f940

  • SHA512

    d9af66764b6e2afed412a8f04fae30d48b40c9a4e752f7a064e6a44b77e4439bfe77bf028ec7e906de59376dcf0b4b8593cdeab1d4194f0e02defc2279be5b3f

  • SSDEEP

    1536:rwN15pzo7ES9ppEbUruZ5MdNieU6yf5oAnqDM+4yyF:8N1bBOpESdNifCuq4cyF

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 2 IoCs
  • Malware Backdoor - Berbew 1 IoCs

    Berbew is a malware infection classified as a 'backdoor' Trojan. This malicious program's primary function is to cause chain infections - it can download/install additional malware such as other Trojans, ransomware, and cryptominers.

  • Drops file in System32 directory 3 IoCs
  • Modifies registry class 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.105f0e78b1b9a26d9247b107bc07c060.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.105f0e78b1b9a26d9247b107bc07c060.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Drops file in System32 directory
    • Modifies registry class
    PID:2036

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2036-0-0x0000000000400000-0x0000000000441000-memory.dmp

          Filesize

          260KB